Lucene search

K
gentooGentoo FoundationGLSA-200606-10
HistoryJun 11, 2006 - 12:00 a.m.

Cscope: Many buffer overflows

2006-06-1100:00:00
Gentoo Foundation
security.gentoo.org
10

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.053 Low

EPSS

Percentile

93.1%

Background

Cscope is a developer’s tool for browsing source code.

Description

Cscope does not verify the length of file names sourced in #include statements.

Impact

A user could be enticed to source a carefully crafted file which will allow the attacker to execute arbitrary code with the permissions of the user running Cscope.

Workaround

There is no known workaround at this time.

Resolution

All Cscope users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-util/cscope-15.5-r6"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-util/cscope< 15.5-r6UNKNOWN

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.053 Low

EPSS

Percentile

93.1%